A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach

被引:0
作者
Abdul Nasir Khan
M. L. Mat Kiah
Mazhar Ali
Shahaboddin Shamshirband
Atta ur Rehman Khan
机构
[1] University of Malaya,Faculty of Computer Science & Information Technology
[2] North Dakota State University,Department of Electrical and Computer Engineering
[3] COMSATS,Department of Computer Science
[4] King Saud University,College of Computer and Information Sciences
来源
Journal of Grid Computing | 2015年 / 13卷
关键词
Cloud computing; Mobile cloud computing; Security; Privacy;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing is an emerging computing paradigm that offers on-demand, flexible, and elastic computational and storage services for the end-users. The small and medium-sized business organization having limited budget can enjoy the scalable services of the cloud. However, the migration of the organizational data on the cloud raises security and privacy issues. To keep the data confidential, the data should be encrypted using such cryptography method that provides fine-grained and efficient access for uploaded data without affecting the scalability of the system. In mobile cloud computing environment, the selected scheme should be computationally secure and must have capability for offloading computational intensive security operations on the cloud in a trusted mode due to the resource constraint mobile devices. The existing manager-based re-encryption and cloud-based re-encryption schemes are computationally secured and capable to offload the computationally intensive data access operations on the trusted entity/cloud. Despite the offloading of the data access operations in manager-based re-encryption and cloud-based re-encryption schemes, the mobile user still performs computationally intensive paring-based encryption and decryption operations using limited capabilities of mobile device. In this paper, we proposed Cloud-Manager-based Re-encryption Scheme (CMReS) that combines the characteristics of manager-based re-encryption and cloud-based re-encryption for providing the better security services with minimum processing burden on the mobile device. The experimental results indicate that the proposed cloud-manager-based re-encryption scheme shows significant improvement in turnaround time, energy consumption, and resources utilization on the mobile device as compared to existing re-encryption schemes.
引用
收藏
页码:651 / 675
页数:24
相关论文
共 69 条
[1]  
Shamsi J(2013)Data-intensive cloud computing: requirements, expectations, challenges, and solutions Journal of Grid Computing 11 281-310
[2]  
Khojaye MA(2014)A survey of mobile cloud computing application models Communications Surveys & Tutorials, IEEE 16 393-413
[3]  
Qasmi MA(2010)Cloud computing for mobile users: Can offloading computation save energy? Computer 43 51-56
[4]  
Khan AR(2014)A review of auto-scaling techniques for elastic applications in cloud environments Journal of Grid Computing 12 559-592
[5]  
Othman M(2013)Towards secure mobile cloud computing: a survey Futur. Gener. Comput. Syst. 29 1278-1299
[6]  
Madani SA(2015)Energy efficient computational offloading framework for mobile cloud computing Journal of Grid Computing 13 1-18
[7]  
Khan SU(2012)Policy based resource allocation in IaaS cloud Futur. Gener. Comput. Syst. 28 94-103
[8]  
Kumar K(2009)The reservoir model and architecture for open federated cloud computing IBM J. Res. Dev. 53 1-11
[9]  
Lu YH(2015)Security in cloud computing: Opportunities and challenges Inf. Sci. 305 357-383
[10]  
Lorido-Botran T(2012)Taxonomy of the security aspects of cloud computing systems-a survey Int. J. Appl. Inf. Syst. 4 21-28